219 research outputs found

    Postulates for Revocation Schemes

    Get PDF
    In access control frameworks with the possibility of delegating permissions and administrative rights, delegation chains can form. There are di erent ways to treat these delegation chains when revoking rights, which give rise to di erent revocation schemes. Hagstr om et al. [11] proposed a framework for classifying revocation schemes, in which the di erent revocation schemes are de ned graph-theoretically. At the outset, we identify multiple problems with Hagstr om et al.'s de nitions of the revocation schemes, which can pose security risks. This paper is centered around the question how one can systematically ensure that improved de nitions of the revocation schemes do not lead to similar problems. For this we propose to apply the axiomatic method originating in social choice theory to revocation schemes. Our use of the axiomatic method resembles its use in belief revision theory. This means that we de ne postulates that describe the desirable behaviour of revocation schemes, study which existing revocation frameworks satisfy which postulates, and show how all de ned postulates can be satis ed by de ning the revocation schemes in a novel way

    FO(ID) as an Extension of DL with Rules

    Full text link

    Endothelial cell apoptosis in chronically obstructed and reperfused pulmonary artery

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Endothelial dysfunction is a major complication of pulmonary endarterectomy (PTE) that can lead to pulmonary edema and persistent pulmonary hypertension. We hypothesized that endothelial dysfunction is related to increased endothelial-cell (EC) death.</p> <p>Methods</p> <p>In piglets, the left pulmonary artery (PA) was ligated to induce lung ischemia then reimplanted into the main PA to reperfuse the lung. Animals sacrificed 5 weeks after ligation (n = 5), 2 days after reperfusion (n = 5), or 5 weeks after reperfusion (n = 5) were compared to a sham-operated group (n = 5). PA vasoreactivity was studied and eNOS assayed. EC apoptosis was assessed by TUNEL in the proximal and distal PA and by caspase-3 activity assay in the proximal PA. Gene expression of pro-apoptotic factors (thrombospondin-1 (Thsp-1) and plasminogen activator inhibitor 1 (PAI-1)) and anti-apoptotic factors vascular endothelial growth factor (VEGF) and basic fibroblast growth factor (bFGF) was investigated by QRT-PCR.</p> <p>Results</p> <p>Endothelium-dependent relaxation was altered 5 weeks after ligation (<it>p </it>= 0.04). The alterations were exacerbated 2 days after reperfusion (p = 0.002) but recovered within 5 weeks after reperfusion. EC apoptosis was increased 5 weeks after PA ligation (<it>p </it>= 0.02), increased further within 2 days after reperfusion (<it>p </it>< 0.0001), and returned to normal within 5 weeks after reperfusion. Whereas VEGF and bFGF expressions remained unchanged, TSP and PAI-1 expressions peaked 5 weeks after ligation (<it>p </it>= 0.001) and returned to normal within 2 days after reperfusion.</p> <p>Conclusion</p> <p>Chronic lung ischemia induces over-expression of pro-apoptotic factors. Lung reperfusion is followed by a dramatic transient increase in EC death that may explain the development of endothelial dysfunction after PE. Anti-apoptotic agents may hold considerable potential for preventing postoperative complications.</p

    Retrieval effectiveness of written and spoken queries : an experimental evaluation

    Get PDF
    With the fast growing speech technologies, the world is emerging to a new speech era. Speech recognition has now become a practical technology for real world applications. While some work has been done to facilitate retrieving information in speech format using textual queries, the characteristics of speech as a way to express an information need has not been extensively studied. If one compares written versus spoken queries, it is intuitive to think that users would issue longer spoken queries than written ones, due to the ease of speech. Is this in fact the case in reality? Also, if this is the case, would longer spoken queries be more effective in helping retrieving relevant document than written ones? This paper presents some new findings derived from an experimental study to test these intuitions

    Essential versus accessory aspects of cell death: recommendations of the NCCD 2015

    Get PDF
    Cells exposed to extreme physicochemical or mechanical stimuli die in an uncontrollable manner, as a result of their immediate structural breakdown. Such an unavoidable variant of cellular demise is generally referred to as ‘accidental cell death’ (ACD). In most settings, however, cell death is initiated by a genetically encoded apparatus, correlating with the fact that its course can be altered by pharmacologic or genetic interventions. ‘Regulated cell death’ (RCD) can occur as part of physiologic programs or can be activated once adaptive responses to perturbations of the extracellular or intracellular microenvironment fail. The biochemical phenomena that accompany RCD may be harnessed to classify it into a few subtypes, which often (but not always) exhibit stereotyped morphologic features. Nonetheless, efficiently inhibiting the processes that are commonly thought to cause RCD, such as the activation of executioner caspases in the course of apoptosis, does not exert true cytoprotective effects in the mammalian system, but simply alters the kinetics of cellular demise as it shifts its morphologic and biochemical correlates. Conversely, bona fide cytoprotection can be achieved by inhibiting the transduction of lethal signals in the early phases of the process, when adaptive responses are still operational. Thus, the mechanisms that truly execute RCD may be less understood, less inhibitable and perhaps more homogeneous than previously thought. Here, the Nomenclature Committee on Cell Death formulates a set of recommendations to help scientists and researchers to discriminate between essential and accessory aspects of cell death

    Inferring Accountability from Trust Perceptions

    Get PDF
    International audienceOpaque communications between groups of data processors leave individuals out of touch with the circulation and use of their personal information. Empowering individuals in this regard requires sup-plying them — or auditors on their behalf — with clear data handling guarantees. We introduce an inference model providing individuals with global (organization-wide) accountability guarantees which take into account user expectations and varying levels of usage evidence, such as data handling logs. Our model is implemented in the IDP knowledge base system and demonstrated with the scenario of a surveillance infrastructure used by a railroad company. We show that it is flexible enough to be adapted to any use case involving communicating stakeholders for which a trust hierarchy is defined. Via auditors acting for them, individuals can obtain global accountability guarantees, providing them with a trust-dependent synthesis of declared and proven data handling practices for an entire organization

    Reduced Secretion of YopJ by Yersinia Limits In Vivo Cell Death but Enhances Bacterial Virulence

    Get PDF
    Numerous microbial pathogens modulate or interfere with cell death pathways in cultured cells. However, the precise role of host cell death during in vivo infection remains poorly understood. Macrophages infected by pathogenic species of Yersinia typically undergo an apoptotic cell death. This is due to the activity of a Type III secreted effector protein, designated YopJ in Y. pseudotuberculosis and Y. pestis, and YopP in the closely related Y. enterocolitica. It has recently been reported that Y. enterocolitica YopP shows intrinsically greater capacity for being secreted than Y. pestis YopJ, and that this correlates with enhanced cytotoxicity observed for high virulence serotypes of Y. enterocolitica. The enzymatic activity and secretory capacity of YopP from different Y. enterocolitica serotypes have been shown to be variable. However, the underlying basis for differential secretion of YopJ/YopP, and whether reduced secretion of YopJ by Y. pestis plays a role in pathogenesis during in vivo infection, is not currently known. It has also been reported that similar to macrophages, Y. enterocolitica infection of dendritic cells leads to YopP-dependent cell death. We demonstrate here that in contrast to Y. enterocolitica, Y. pseudotuberculosis infection of bone marrow–derived dendritic cells does not lead to increased cell death. However, death of Y. pseudotuberculosis–infected dendritic cells is enhanced by ectopic expression of YopP in place of YopJ. We further show that polymorphisms at the N-terminus of the YopP/YopJ proteins are responsible for their differential secretion, translocation, and consequent cytotoxicity. Mutation of two amino acids in YopJ markedly enhanced both translocation and cytotoxicity. Surprisingly, expression of YopP or a hypersecreted mutant of YopJ in Y. pseudotuberculosis resulted in its attenuation in oral mouse infection. Complete absence of YopJ also resulted in attenuation of virulence, in accordance with previous observations. These findings suggest that control of cytotoxicity is an important virulence property for Y. pseudotuberculosis, and that intermediate levels of YopJ-mediated cytotoxicity are necessary for maximal systemic virulence of this bacterial pathogen

    From fuzzy to annotated semantic web languages

    Get PDF
    The aim of this chapter is to present a detailed, selfcontained and comprehensive account of the state of the art in representing and reasoning with fuzzy knowledge in Semantic Web Languages such as triple languages RDF/RDFS, conceptual languages of the OWL 2 family and rule languages. We further show how one may generalise them to so-called annotation domains, that cover also e.g. temporal and provenance extensions
    corecore